Several remote vulnerabilities have been discovered in OpenSSH, a freeimplementation of the Secure Shell protocol, which may lead to denial ofservice and potentially the execution of arbitrary code. The CommonVulnerabilities and Exposures project identifies the following problems:

CVE-2006-4924

Tavis Ormandy of the Google Security Team discovered a denial of service vulnerability in the mitigation code against complexity attacks, which might lead to increased CPU consumption until a timeout is triggered. This is only exploitable if support for SSH protocol version 1 is enabled.

CVE-2006-5051

Mark Dowd discovered that insecure signal handler usage could potentially lead to execution of arbitrary code through a double free. The Debian Security Team doesn't believe the general openssh package without Kerberos support to be exploitable by this issue. However, due to the complexity of the underlying code we will issue an update to rule out all eventualities.

For the stable distribution (sarge) these problems have been fixed inversion 3.8.1p1-7sarge1.

For the unstable distribution (sid) these problems have been fixed inversion 4.3p2-4 of openssh. openssh-krb5 will soon be converted towardsa transitional package against openssh.

We recommend that you upgrade your openssh-krb5 packages.

Upgrade Instructions- --------------------

wget url will fetch the file for youdpkg -i file.deb will install the referenced file.

If you are using the apt-get package manager, use the line forsources.list as given below: